Chat now with support
Chat with Support

Safeguard Authentication Services 4.1.3 - Administration Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Authentication Services Unix administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment Integrating with other applications Managing Unix hosts with Group Policy
Authentication Services Group Policy
Group Policy Concepts Unix policies One Identity policies
Integrating with GPMC
Display specifiers Troubleshooting

Files to Exclude List file

The Files to Exclude List file contains a list of files and directories for which you do not want to change the ownership. It is produced by X? and is passed to oat_changeowners.

<file_list> ::= { < file_list_entry > <CRLF> }
<file_list_entry> ::= <full_file_name> |
<full_directory_name> |
<full_file_name> ::= '/' { <character> }
<full_directory_name> ::= '/' { <character> }
<regular_expression> ::= 'regexp:' { <character> }

Processed Files List file

The Processed Files List file contains a list of files and directories for which the ownership was changed. It is produced by oat_changeowners. Backup files are saved in /var/opt/quest/oatwork.

<file_list> ::= { <full_file_name> '(' <original_permissions> ')' <CRLF> }
<full_file_name> ::= <character> { <character> }
<original_permissions> ::= <character> { <character> }

Certificate Autoenrollment

Certificate Autoenrollment is a feature of Authentication Services 4.1 based on Microsoft Open Specifications. Certificate Autoenrollment allows Mac OS X/macOS®, UNIX and Linux clients to take advantage of existing Microsoft infrastructure to automatically enroll for and install certificates. Certificate policy controls which certificates are enrolled and what properties those certificates will have.

With Certificate Autoenrollment, a public/private key pair is automatically generated according to certificate template parameters defined in Group Policy. The public key is sent to the Certification Authority (CA) and the CA responds with a new certificate corresponding to the public key which is installed along with the private key into the appropriate system or user keychain on the Mac , UNIX or Linux client.

You can use Group Policy to automatically configure which certificate enrollment policy servers to use for Certificate Autoenrollment and to periodically run Certificate Autoenrollment.

By following the instructions presented in this section, a system administrator will be able to configure new or existing systems to download certificate enrollment policy from a certificate enrollment policy server. Additionally, the systems will automatically enroll and renew certificates based on the certificate enrollment policy.

Certificate Autoenrollment is an optional package distributed with One IdentityAuthentication Services. For instructions on installing this package, see the One Identity Authentication Services Installation Guide.

Certificate Autoenrollment on UNIX and Linux

Most of the Certificate Autoenrollment code is implemented in Java. After this code has successfully requested a certificate from a CA, it invokes platform-specific code to store the private key and certificate in a suitable way for the operating system or for particular applications. This platform-specific code is implemented as a shell script, in the /var/opt/quest/vascert/script directory.

The script is a platform-agnostic front end that chooses and loads a platform-specific back end script:

  • For Mac OS X®/macOS®, the back end script is This script provides a fully functional implementation that uses the /usr/bin/security tool to integrate with Max OS X/macOS keychains.
  • For UNIX®/Linux®, the back end script is This script provides a skeletal implementation that is convenient for initial experimentation and may be used as the basis for implementation; the script itself does not provide a fully functional implementation:
    • Some of the shell functions in simply print "UNIMPLEMENTED" and return a nonzero exit status to indicate failure.
    • The following shell functions in are mock implementations designed to facilitate simple experimentation with the "vascert pulse" command for a user:
      • importIdentity()
      • exportUserCerts()
    • These mock implementations assume that the openssl command is installed and available on the default PATH.
    • The mock implementations also make some platform-specific assumptions (for example, they invoke the mv command with the --backup option), but these are not critical and can be removed.

    As a consequence, on UNIX/Linux some important Certificate Autoenrollment commands, such as "vascert pulse" for the superuser will NOT work until the necessary platform-specific functionality has been implemented in or a similar script.

Related Documents